Skip to main content

A Study on Hiding Internet of Things (IoT) Communication

  • Conference paper
  • First Online:
Advances in Data Science and Computing Technologies (ADSC 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1056))

  • 183 Accesses

Abstract

Internet of Things (IoT) has been a part of our day-to-day lives for a few decades, and it has been utilised to make our lives easier and more pleasant in many ways. However, as much as it provides more comfort, it also presents a myriad of challenges. The majority of these challenges are caused by security risks and bad intentions on the part of the users. The threats were mostly focussed on data confidentiality and privacy, among other things. The Internet of Things (IoT) has sparked widespread anxiety about the potential for information leakage. As a result, a secure environment is essential to ensure that data is transmitted from its devices over the network without being compromised. Energy and computational power, on the other hand, are two key limitations for any IoT device, since it is often run on a remote system with limited energy supply and computing capacity; it also transfers data into the world of the Internet in a relatively unprotected manner. In this work, the authors attempted to identify several current steganographic processes that may be used with Internet of Things devices while requiring little computing and energy resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jaidka H, Sharma N, Singh R (2020) Evolution of IoT to IIoT: applications & challenges. In: Proceedings of the international conference on innovative computing & communications (ICICC), p 6

    Google Scholar 

  2. Indu P, Bhattacharyya S (2020) Early work vis-à-vis current trends in internet of things security. In: Daimi K, Francia III G (eds) Innovations in cybersecurity education. Springer, Cham, pp 127–156. https://doi.org/10.1007/978-3-030-50244-7_8

  3. Retrieved from https://internetofthingswiki.com/internet-of-things-definition/. Accessed on 23 Jan 2022

  4. Biswas A, Indu P, Bhattacharyya S (2021) Real-time watermarking of medical images and secure transmission through steganography. In: Mukherjee M, Mandal J, Bhattacharyya S, Huck C, Biswas S (eds) Advances in medical physics and healthcare engineering. Lecture notes in bioengineering. Springer, Singapore, pp 497–506. https://doi.org/10.1007/978-981-33-6915-3_49

  5. Sharma N et al. (2019) Secure hash authentication in IoT based applications. Procedia Comput Sci 165:328–335

    Google Scholar 

  6. Rout H, Mishra BK (2014) Pros and cons of cryptography, steganography and perturbation techniques. IOSR J Electron Commun Eng (IOSR-JECE), pp 76–81. e-ISSN:2278-2834, p-ISSN:2278-8735

    Google Scholar 

  7. Malan J, Eager J, Lale-Demoz E, Ranghieri GC, Brady M (2020) Framing the nature and scale of cyber security vulnerabilities within the current consumer internet of things (IoT) landscape. Centre for Strategy & Evaluation Services LLP, United Kingdom

    Google Scholar 

  8. Retrieved from https://www.fortinet.com/blog/industry-trends/examining-top-iot-security-threats-and-attack-vectors. Accessed on 23 Jan 2022

  9. Indu P, Bhattacharyya S (2021) Hiding IoT communication using DCT difference modulation (DCTDM). In: Mukherjee M, Mandal J, Bhattacharyya S, Huck C, Biswas S (eds) Advances in medical physics and healthcare engineering. Lecture notes in bioengineering. Springer, Singapore, pp 371–380. https://doi.org/10.1007/978-981-33-6915-3_37

  10. Maji G, Mandal S (2020) A forward email based high capacity text steganography technique using a randomized and indexed word dictionary. Multimed Tools Appl. 79:26549–26569. https://doi.org/10.1007/s11042-020-09329-z

  11. Kabulov A et al. (2021) Algorithmic method of security of the Internet of Things based on steganographic coding. In: 2021 IEEE International IOT, electronics and mechatronics conference (IEMTRONICS). IEEE, pp 1–5. https://doi.org/10.1109/IEMTRONICS52119.2021.9422588

  12. Yin JHJ et al. (2015) Internet of things: securing data using image steganography. In: 2015 3rd International conference on artificial intelligence, modelling and simulation (AIMS). IEEE, pp 310–314. https://doi.org/10.1109/AIMS.2015.56

  13. Amjath MIM, Senthooran V (2020) Secure communication using steganography in IoT environment. In: 2020 2nd International conference on advancements in computing (ICAC). IEEE, pp 114–119. https://doi.org/10.1109/ICAC51239.2020.9357260

  14. Meng R et al. (2019) A steganography algorithm based on CycleGAN for covert communication in the internet of things. IEEE Access 7:90574–90584. https://doi.org/10.1109/ACCESS.2019.2920956

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pabak Indu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarkar, U.D., Samanta, N., Indu, P. (2023). A Study on Hiding Internet of Things (IoT) Communication. In: Chakraborty, B., Biswas, A., Chakrabarti, A. (eds) Advances in Data Science and Computing Technologies. ADSC 2022. Lecture Notes in Electrical Engineering, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-99-3656-4_10

Download citation

Publish with us

Policies and ethics